Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

ECCouncil 312-38 - Certified Network Defender (CND)

Page: 7 / 11
Total 362 questions

Management wants to calculate the risk factor for their organization. Kevin, a network administrator in the organization knows how to calculate the risk factor. Certain parameters are required before calculating risk

factor. What are they? (Select all that apply) Risk factor =.............X...............X...........

A.

Vulnerability

B.

Impact

C.

Attack

D.

Threat

Which of the following network security controls can an administrator use to detect, deflect or study attempts to gain unauthorized access to information systems?

A.

IDS/IPS

B.

Network Protocol Analyzer

C.

Proxy Server

D.

Honeypot

Which of the following statements holds true in terms of virtual machines?

A.

Hardware-level virtualization takes place in VMs

B.

All VMs share the host OS

C.

VMs are light weight than container

D.

OS-level virtualization takes place in VMs

What represents the ability of an organization to respond under emergency in order to minimize the damage to its brand name, business operation, and profit?

A.

Disaster recovery

B.

Incident management

C.

Emergency management

D.

Crisis management

Daniel is giving training on designing and implementing a security policy in the organization. He is explaining the hierarchy of the security policy which demonstrates how policies are drafted, designed and implemented.

What is the correct hierarchy for a security policy implementation?

A.

Laws, Policies, Regulations, Procedures and Standards

B.

Regulations, Policies, Laws, Standards and Procedures

C.

Laws, Regulations, Policies, Standards and Procedures

D.

Procedures, Policies, Laws, Standards and Regulations

What should a network administrator perform to execute/test the untrusted or untested programs or code from untrusted or unverified third-parties without risking the host system or OS?

A.

Application Whitelisting

B.

Application Blacklisting

C.

Deployment of WAFs

D.

Application Sandboxing

Which of the following provides the target for designing DR and BC solutions?

A.

RCO

B.

RTO

C.

RPO

D.

RGO

On which layer of the OSI model does the packet filtering firewalls work?

A.

Network Layer

B.

Application Layer

C.

Session Layer

D.

Physical Layer

Assume that you are a network administrator and the company has asked you to draft an Acceptable Use Policy (AUP) for employees. Under which category of an information security policy does AUP fall into?

A.

System Specific Security Policy (SSSP)

B.

Incident Response Policy (IRP)

C.

Enterprise Information Security Policy (EISP)

D.

Issue Specific Security Policy (ISSP)

Which of the following network security protocols protects from sniffing attacks by encrypting entire communication between the clients and server including user passwords?

A.

TACACS+

B.

RADIUS

C.

CHAP

D.

PAP